Skip to content
This repository has been archived by the owner on Apr 22, 2023. It is now read-only.

crypto: allow runtime opt in using SSLv2/SSLv3 #8555

Closed
wants to merge 2 commits into from

Conversation

tjfontaine
Copy link

This change disables SSLv2/SSLv3 use by default, and introduces a command line flag to opt into using SSLv2/SSLv3.

SSLv2 and SSLv3 are considered unsafe, and should only be used in situations where compatibility with other components is required and they cannot be upgrade to support newer forms of TLS.

This change disables SSLv2/SSLv3 use by default, and introduces a
command line flag to opt into using SSLv2/SSLv3.

SSLv2 and SSLv3 are considered unsafe, and should only be used in
situations where compatibility with other components is required and
they cannot be upgrade to support newer forms of TLS.
@Nodejs-Jenkins Nodejs-Jenkins changed the title crypto: allow runtime opt in using SSLv2/SSLv3 crypto: allow runtime opt in using SSLv2/SSLv3 Oct 15, 2014
@@ -125,7 +126,6 @@ static Persistent<String> enter_symbol;
static Persistent<String> exit_symbol;
static Persistent<String> disposed_symbol;


Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Irrelevant change?

@indutny
Copy link
Member

indutny commented Oct 15, 2014

One minor nit, otherwise LGTM

@DomT4
Copy link

DomT4 commented Oct 15, 2014

👍 from me on this. Honestly, I think at this point if you're going to opt into ssl2 you may as well just start yelling your sensitive data out of the window anyway, but I'm glad it'll be off by default. SSLv3 is a little more used and problematic to disable from the onset, but with the fallback method build into today's OpenSSL release the downsides of that move should be relatively minimized, so 👍.

I presume OpenSSL 1.0.1j will be worked in to close the other CVEs disclosed and then new releases of the 10 & 11 branches pushed?

@tjfontaine
Copy link
Author

1.0.1j is already landed in both 0.10 and 0.12 branches

@DomT4
Copy link

DomT4 commented Oct 15, 2014

Awesome. Is there a release in the works once this issue is settled?

@tjfontaine
Copy link
Author

There will be a v0.10 release tomorrow

@DomT4
Copy link

DomT4 commented Oct 16, 2014

Thanks, Will keep an eye out for it. Appreciate the replies.

@tjfontaine
Copy link
Author

landed in c1f4aac and d601c76

@richardlau
Copy link
Member

@tjfontaine It looks like the v0.12 branch didn't get OpenSSL 1.0.1j and is still on 1.0.1i. Any plans to update and address the POODLE vulnerability in 0.12?

@DomT4
Copy link

DomT4 commented Nov 26, 2014

^ 👍 for that. The devel builds getting left behind consistently on SSL vulns is a little troubling.

indutny added a commit to indutny/io.js that referenced this pull request Nov 27, 2014
@indutny
Copy link
Member

indutny commented Nov 27, 2014

Should be fixed by nodejs/node#1

@DomT4
Copy link

DomT4 commented Nov 28, 2014

Is there any chance of that being reported back to the 0.11.x branch, or is the 0.11.x branch frozen at this point for 0.12?

@indutny
Copy link
Member

indutny commented Nov 28, 2014

@DomT4 Not that much, the v0.11 just does not exist anymore, the proper branch in v0.12.

@DomT4
Copy link

DomT4 commented Nov 28, 2014

@indutny Cool. Cheers for the clarification, I was a little confused about the status of the 0.11.x branch alongside 0.12.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants